Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Storage media & peripherals
A unique feature of this textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This third edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems and the Internet of things, the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.
In recent years, computer graphics has evolved into four major
disciplines: computer animation, image processing, visualization,
and virtual reality. Now these technologies are converging into one
seamless digital medium resulting in various tools that will
transform the way we work in the next century.
Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch fur die Prufungsvorbereitung zum "Certified Information Security Manager (CISM)" nach ISACA.Nach einer Einleitung bereitet der erste Teil des Buches in vier Kapiteln auf das CISM-Examen vor. Diese wurden analog zur Struktur der ISACA - "Security Governance", "Risk Management", "Security Program Development and Management" und "Incident Response" - gegliedert. Der zweite Teil beschaftigt sich mit dem IT-Grundschutz-Standard des BSI und der Implementierung von Sicherheit anhand eines Baseline-Ansatzes. Der dritte und letzte Teil greift schliesslich die vorab diskutierten Aspekte anhand von praktischen Beispielen auf und erganzt sie durch aktuelle Themen, wie unter anderem das IT-Sicherheitsgesetz.Ein detaillierter Index und ein umfangreiches Glossar runden das Buch ab und machen es zudem zu einem Nachschlagewerk im Bereich des Informationssicherheits-Managements.
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime. Combine this fact with the skyrocketing TCO of data storage management, and it is apparent that server disk management is a subject deserving of much more scrutiny.
|
You may like...
Magnetic Information Storage Technology…
Shan X. Wang, Alex M Taratorin
Hardcover
R3,549
Discovery Miles 35 490
Storage Management in Data Centers…
Volker Herminghaus, Albrecht Scriba
Hardcover
Perpendicular Magnetic Recording
Sakhrat Khizroev, Dmitri Litvinov
Hardcover
R2,892
Discovery Miles 28 920
Calibration and Orientation of Cameras…
Armin Gruen, Thomas S. Huang
Hardcover
R2,929
Discovery Miles 29 290
Hardware Based Packet Classification for…
Chad R. Meiners, Alex X. Liu, …
Hardcover
R2,862
Discovery Miles 28 620
|